The Power of Verification Queries in Message Authentication and Authenticated Encryption, Cryptology ePrint Archive, vol.309, 2004. ,
Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979. ,
DOI : 10.1016/0022-0000(79)90044-8
URL : http://doi.org/10.1016/0022-0000(79)90044-8
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2 Document 1: UEA2 and UIA2 Specification. Version 2.1, 16th, Tech. rep., ETSI, 2009. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1, p.ETSI, 2010. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, p.ETSI, 2010. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, p.ETSI, 2010. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5, 4th, Tech. rep., ETSI, 2011. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification. Version 1.5, 4th, Tech. rep., ETSI, 2011. ,
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report. Version 1.3, 18th, Tech. rep., ETSI, 2011. ,
Key Recovery Attacks on Universal Hash Function Based MAC Algorithms Advances in Cryptology -CRYPTO, pp.144-161, 2008. ,
LFSR-based Hashing and Authentication Advances in Cryptology -CRYPTO' 94, pp.129-139, 1994. ,
Plaintext Recovery Attacks against SSH, 2009 30th IEEE Symposium on Security and Privacy, pp.16-26, 2009. ,
DOI : 10.1109/SP.2009.5
Bucket Hashing and its Application to Fast Message Authentication Advances in Cryptology -CRYPTO' 95, pp.29-42, 1995. ,
Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, vol.12, issue.2, pp.91-115, 1999. ,
DOI : 10.1007/PL00003822
On Fast and Provably Secure Message Authentication Based on Universal Hashing, Advances in Cryptology -CRYPTO' 96, pp.313-328, 1996. ,
DOI : 10.1007/3-540-68697-5_24
Universal hashing and authentication codes, Designs, Codes and Cryptography, vol.22, issue.3, pp.369-380, 1994. ,
DOI : 10.1007/BF01388651
Preliminary Cryptanalysis Results of ZUC. Presented at the First International Workshop on ZUC Algorithm, 2010. ,
New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981. ,
DOI : 10.1016/0022-0000(81)90033-7
Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3 ,